Protecting services from security mis-configuration.
Nabeel HadaadLuke DruryRonald G. AddiePublished in: ITNAC (2015)
Keyphrases
- functional requirements
- web services
- service providers
- service oriented
- information systems
- ubiquitous computing
- service discovery
- access control
- end users
- communication protocols
- policy enforcement
- network security
- information services
- mobile services
- privacy preserving
- user privacy
- network services
- identity management
- mobile commerce
- enterprise network
- security management
- service management
- intrusion detection
- computing environments